cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
β1,245Updated last year
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.β557Updated this week
- π A curated list of awesome Docker security resourcesβ686Updated 3 months ago
- β570Updated 2 years ago
- NMAP Vulnerability Scanning Scriptsβ628Updated 3 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,144Updated 11 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,140Updated last year
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web servicesβ490Updated 2 years ago
- Automating situational awareness for cloud penetration tests.β2,195Updated this week
- Granular, Actionable Adversary Emulation for the Cloudβ2,158Updated last week
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secuβ¦β1,044Updated last week
- A curated list of awesome CI CD security resourcesβ613Updated 10 months ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.β1,570Updated 3 years ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assetsβ814Updated 5 months ago
- My cheatsheet notes to pentest AWS infrastructureβ688Updated 2 years ago
- π¦π Awesome list of secrets in environment variables π₯οΈβ896Updated 3 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,732Updated last year
- Checklist for container security - devsecops practicesβ1,590Updated last week
- Automated Red Team Infrastructure deployement using Dockerβ1,249Updated 3 years ago
- all paths lead to cloudsβ638Updated last year
- Detector for Log4Shell exploitation attemptsβ731Updated 3 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ2,003Updated 9 months ago
- A Blazing fast Security Auditing tool for Kubernetesβ1,002Updated last year
- Tracking interesting Linux (and UNIX) malware. Send PRsβ1,193Updated 4 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β1,011Updated 2 months ago
- Open Source Package Analysisβ844Updated 5 months ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmβ¦β758Updated 9 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,466Updated 2 years ago
- Storage Explorer - Publicly open storage viewer (Amazon S3 Bucket, Azure Blob, FTP server, HTTP Index Of/)β449Updated last year
- Dangerously fast DNS/network/port scannerβ919Updated 3 years ago
- LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requeβ¦β1,456Updated last year